Login / Signup
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.
Paul C. van Oorschot
Michael J. Wiener
Published in:
CRYPTO (1996)
Keyphrases
</>
orders of magnitude
state space
countermeasures
search problems
brute force search
sat solvers
malicious attacks
security protocols
reinforcement learning